Collaborating Authors

Time for Australia to build a cybersecurity industry: Stone & Chalk


Stone & Chalk CEO Alex Scandurra has proposed that cybersecurity discussions will help large organisations and local startups come together. "What we're proposing to do is to create a joint cybersecurity innovation program where we bring the two sides of the market together," he said during the opening of the National Fintech Cyber Security Summit in Sydney on Tuesday. "We have an opportunity to bring large organisations, including government, to represent the demand side of the equation, and to surface those opportunities and those problems to be solved, and then bring the supply side of the market -- which are top researchers and research organisations like Data 61, and some of our key universities together with top startups and innovative talent -- to create and commercialise that very same IP the big end of town is looking for and is ready to consume." Scandurra pointed out that this move will help Australia develop its own local cybersecurity community, something that he believes Australia is more than capable of creating. "We need, as a country, to leverage our collective talent, but also not continually rely on Israel, the US, and other markets to provide us cybersecurity capabilities.

A Security Framework for Military IoT Devices and Weapons Systems


When it comes to the cybersecurity standards of connected weapons systems and IoT devices used in military, it's imperative to be able to verify their security robustness. Unfortunately, that's not always easy, as different countries have various ways of acquiring and managing their weapons systems. It makes it very challenging to have a unified cybersecurity standard for IoT in this field. Still, cybersecurity experts need to work on solving this issue and providing alternatives to the current system. To sufficiently raise cybersecurity standards and protect the systems, we must come to a point where every country takes the same approach and uses the same evaluation framework.

Enterprise cloud adoption outstrips cybersecurity capabilities


Enterprise companies are adopting SaaS at a rapid pace but are failing to budget for security solutions to protect the data they hold, research suggests. On Tuesday, cloud security firm iboss released a white paper documenting the rising adoption rates of software as a service (SaaS) applications, which while often valuable for companies, may also pose a risk when cybersecurity is an afterthought. The report, titled "Head in the Cloud: Misconceptions Hindering Enterprise Cloud Adoption," claims that 64 percent of US enterprise players believe the pace of SaaS application adoption is "outpacing their cybersecurity capabilities." In total, 61 percent of enterprise IT staff cite data privacy as a primary concern for the growing adoption of SaaS. With data breaches now so commonplace, the idea of sensitive, corporate information being leaked from non-secure cloud environments causes IT staff to break out in a cold sweat.

Trends that will shape the security industry in 2022 - Help Net Security


Entering 2022, the world continues to endure the pandemic. But the security industry has, no doubt, continued to shift, adapt, and develop in spite of things. Several trends have even accelerated. Beyond traditional "physical security," a host of frontiers like AI, cloud computing, IoT, and cybersecurity are being rapidly pioneered by entities big and small in our industry. By all appearances, the security industry is in a stage of redefining itself.

How To Build A Cybersecurity Strategy For 2017

Forbes - Tech

Technology changes faster than most business can keep up with. The proliferation of mobile technology, the Internet of Things (IoT) and cloud computing has changed the types of "assets" connected to networks. Implementing cybersecurity "best practices" across an increasingly unstructured and decentralized network is one of the most vexing challenges facing companies today. Traditional cybersecurity approaches revolved around the medieval concept of "protecting the crown jewels" – a concentric circle view of layered security focused on protecting the important data at the center through successive layers of defenses such as application, host-based, network (internal and external perimeter) and physical controls. This defensive strategy works in a centralized, controlled and managed-device network, which is becoming increasingly extinct.